2022
DOI: 10.4018/978-1-7998-8693-8.ch007
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

Abstract: Cybersecurity refers to the organizational practices followed by the different multinational companies to defend their computers, servers, mobile devices, and networks from malicious attacks. This data exploitation is usually done by accessing, changing, or destroying sensitive information or hacking the data for money extortion. It applies to systems and mechanisms aimed at stopping unauthorized entry, bugs, and cybercriminal threats to devices, networks, and records. It does not matter how many technologies … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(4 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…Figure 1. Traditional Client/Server Architecture Business Model However, dictionary attack [1] , rainbow table attack [2] , social engineering attack [3] and other means can pose a serious threat. It is fragile [4] and has following disadvantages [5] :…”
Section: Authentication Phasementioning
confidence: 99%
“…Figure 1. Traditional Client/Server Architecture Business Model However, dictionary attack [1] , rainbow table attack [2] , social engineering attack [3] and other means can pose a serious threat. It is fragile [4] and has following disadvantages [5] :…”
Section: Authentication Phasementioning
confidence: 99%
“…These include user education and training, implementation of robust security policies, multi-factor authentication, and continuous monitoring of suspicious activities. Advanced AI-driven solutions can also be employed to identify and thwart SE attempts in real-time [26].…”
Section: Se Detection and Mitigation Techniquesmentioning
confidence: 99%
“…This information may be employed directly in the execution of the attack or used to obtain further information from secondary sources [24]. Once the attacker has gathered sufficient details on the target, they advance to the relationship establishment stage, focusing on cultivating trust with the target [25], [26]. The exploitation stage aims to accomplish the attack's objective by employing persuasive and manipulative techniques to retrieve sensitive information from the target or mislead them into making security mistakes [27], [28].…”
Section: Overview Of Social Engineering a Concept And Stagesmentioning
confidence: 99%